Top Rated Darwin Attack Alternatives
37 Darwin Attack Reviews
Overall Review Sentiment for Darwin Attack
Log in to view review sentiment.
Not only did they exploit vulnerabilities, but they showed us how to correct the vulnerabilities. The communication from the pentesters and our company was great. While we were being actively pentested, we were able to reach out to confirm if the attack was from them or from an acutal threat.
The debreif was quick and very detailed. The instructions were clear to follow on best practices for our vulnerabilities Review collected by and hosted on G2.com.
Honestly, I have no issues with them this year. Everything went smoothly. Review collected by and hosted on G2.com.

Ease of use of the interface to configure the sites and IPs we needed to test. The interface is technician freindly and allows quick input of data. Once your information is verified the testing is accomplished promptly by the Evolve team. Review collected by and hosted on G2.com.
There was not anything siginificant I can think of. Evolve / Darwin was the first thought I had when a collegue was looking for penn testing services. Review collected by and hosted on G2.com.
The onboarding process for new clients was easy and well detailed. My project manager was hands on and let me go at my pace. Review collected by and hosted on G2.com.
Nothing the product works and provides great reporting. Review collected by and hosted on G2.com.
Rich detail from dashboards and actionable reports. Review collected by and hosted on G2.com.
Usually solution implementation and end user training are an issue for solutions like these but not for Darwin Attack...up and running in minutes. Review collected by and hosted on G2.com.

The Darwin attack platform from Evolve Security has been a helpful tool for managing our yearly application penetration tests. I can do everything I need to through the platform, including communicating with their engineers, tracking issue remediation, and accessing final reports. I like that all the data from previous years is kept so that I can easily refer back to it when I need. Customer support has been consistenyl top notch, they are always quick to respond whenever I've requested custom documentation for picky clients. Review collected by and hosted on G2.com.
Default filters are the one part of Darwin Attack that I would like to see improved. By default the platform will show you everything at once rather than results/vulnerabilities/remediations from your most recent round of testing. Its always a shock to log in and see a large number of issues only to find they were fixed years ago. Review collected by and hosted on G2.com.
Finding vunerabilities that I didn't know we had Review collected by and hosted on G2.com.
Resources to correct the things that Darwin Attack finds. More knowledge articles on how best to secure the things found. Review collected by and hosted on G2.com.

It is a great experience working with Evolve Security, we use the ASM and Continuous PEN Test services.
Darwin Attack features that we like:
-Easy implementation.
-Customer support communication chat inside the portal.
-The time they dedicate and the detailed information shared with each report period.
-The technical team suggested the necessary remediation steps when needed.
-The Number of Features and reports.
-The on-demand Customer-facing letter. Review collected by and hosted on G2.com.
So far we have not found any negative facts on Darwin Attack. Review collected by and hosted on G2.com.

Each project is very well organized and the results for each pentest are easy to navigate. Each result come with the actionable to be implemented in order to remediate each given vulnerability. Review collected by and hosted on G2.com.
Some notifications may go to the spam folder Review collected by and hosted on G2.com.
The Darwin Attack portal makes it easy to track vulnerabilities from identification to remediation. It also provides the reporting we need for our clients. Review collected by and hosted on G2.com.
We have no complaints about the portal - meets all our needs Review collected by and hosted on G2.com.

Darwin attack is a multi-positive experience really. It is not just one thing that I appreciate. The fact that Darwin Attack is a 24-7 and 365 day participation and monitoring service is first and foremost. We did a solid review of the industry and service levels. Darwin Attack / Evolve stood head and shoulders above all others. The constant monitoring was the primary seperation from other services. Second, the platform provides insiights almost realtime. No other service had anything like it. Lastly, after working with the team and experiencing their communication and customer service. It was clear to me we made the right choice! Review collected by and hosted on G2.com.
Consistancy in monitoring, platoform ease and insights, communication and customer service from Evolve's team to point out exposure or vulnerabilities and resolve the issues. Review collected by and hosted on G2.com.